_Other Activities:_ + Perform other security related activities as assigned by the Cybersecurity Manager **Required Skills/Education** + Bachelors degree in computer science, InformationSecurity, or...
With heavy focus in informationsecurity operations, including vulnerabilitymanagement, incident/event management, compliance management, policy/procedure development and informationsecurity awareness...
About Lumen** Lumen connects the world. We are igniting business growth by connecting people, data and applications quickly, securely, and effortlessly. Together, we are building a culture and...
SecurityAnalyst to play a key role in supporting Information and Privacy Risk Management aspects of the company as a member of the InformationSecurity Department....
This role requires a deep understanding of software automation, API design, cloud delivery, system scaling, virtualization technologies, and best practices in informationsecurity....
About the Organization Now is a great time to join Redhorse Corporation. Redhorse specializes in developing and implementing creative strategies and solutions with private, state, and federal...
. + Learns and adapts to new technologies in the ever-changing world of InformationSecurity. + Creates and documents security and privacy policies, procedures, or contractual language, as required....
As a full-service informationsecurity firm, we leverage our knowledge combined with the industry standards for compliance and informationsecurity issues to provide our customers with world class information...
Information Technology or an equivalent area, a Security+ CE, and 1 year of experience with classified systems and RMF (Risk Management Frameworks) Current DOD Secret security clearance Knowledge of ACAS, NESSUS...
Nmap, Nessus, Wireshark, Metasploit, Hydra, John) + Exceptional communication skills, with the ability to explain the technical details of OWASP Top 10 and other vulnerabilities from C-levels to developers...
**Certifications Required** Certified Information Systems Security Professional (CISSP), Certified InformationSecurity Manager (CISM) Salary and Other Compensation:Applications will be accepted until...
security incidents not limited to dashboard (Advanced Threat Appliance & SIEM) alerts, tickets, emails, or phone calls. + Actively hunt the enterprise for insecure, suspicious, or malicious activity...
Moving to West Virginia? Find some basic demographic data about West Virginia below.
Local
National
1,793,392
34,659
Information Security Analyst Online Courses and Training Opportunities
iHire curates thousands of courses in order to recommend the best ones to help further your career. If you register for a course using the links on our site, we may receive a small commission.
When it comes to cyber attacks, the best medicine is prevention. Learn the fundamentals of vulnerabilities, exploits, cryptography, network and web offense and defense. Nominated for the 2020 edX...
Modern businesses process and store vast amounts of sensitive data. Whatever the purpose of this data, its essential that organisations protect it. On this two-week course, youll explore the...
The goal of the Security Analyst Nanodegree Program is to equip students with the skills required to be successful in an analyst role. Our exclusive content is co-created and continually refined...
This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.